Jin Cao
Orcid: 0009-0006-5272-9671
According to our database1,
Jin Cao
authored at least 176 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Netw. Serv. Manag., April, 2024
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024
A fast time integral finite difference method for a space-time fractional FitzHugh-Nagumo monodomain model in irregular domains.
J. Comput. Phys., March, 2024
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024
2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023
Fine-grained imbalanced leukocyte classification with global-local attention transformer.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Identification and evaluation of competitive products based on online user-generated content.
Expert Syst. Appl., September, 2023
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023
Adaptive receptive field U-shaped temporal convolutional network for vulgar action segmentation.
Neural Comput. Appl., May, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Int. J. Intell. Syst., 2023
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Proceedings of the 17th ACM Conference on Recommender Systems, 2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Sharing Encoder Representations across Languages, Domains and Tasks in Large-Scale Spoken Language Understanding.
Proceedings of the The 61st Annual Meeting of the Association for Computational Linguistics: Industry Track, 2023
2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
Decentralized authentication and access control protocol for blockchain-based e-health systems.
J. Netw. Comput. Appl., 2022
J. Netw. Comput. Appl., 2022
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. Ambient Intell. Humaniz. Comput., 2022
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022
Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems.
CoRR, 2022
Inference Acceleration with Adaptive Distributed DNN Partition over Dynamic Video Stream.
Algorithms, 2022
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022
Attention Fusion: a light yet efficient late fusion mechanism for task adaptation in NLU.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022
Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE ACM Trans. Audio Speech Lang. Process., 2021
IEEE Syst. J., 2021
Neural Networks, 2021
NeuroImage, 2021
J. Intell. Fuzzy Syst., 2021
Expert Syst. Appl., 2021
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021
Proceedings of the IEEE International Workshop on Metrology for Automotive, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Zero-shot Generalization in Dialog State Tracking through Generative Question Answering.
Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, 2021
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
A Nested Named Entity Recognition Model Based on Multi-agent Communication Mechanism (Student Abstract).
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Circuits Syst. II Express Briefs, 2020
Land Subsidence Response to Different Land Use Types and Water Resource Utilization in Beijing-Tianjin-Hebei, China.
Remote. Sens., 2020
An Improved Multi-Sensor MTI Time-Series Fusion Method to Monitor the Subsidence of Beijing Subway Network during the Past 15 Years.
Remote. Sens., 2020
Impaired mesocorticolimbic connectivity underlies increased pain sensitivity in chronic low back pain.
NeuroImage, 2020
Characterizing the analgesic effects of real and imagined acupuncture using functional and structure MRI.
NeuroImage, 2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
Concurr. Comput. Pract. Exp., 2020
IEEE Commun. Surv. Tutorials, 2020
Adaptive on Time Controlled Double-Line- Frequency Ripple Suppressor With Fast Dynamic Response and High Efficiency.
IEEE Access, 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Style Attuned Pre-Training and Parameter Efficient Fine-Tuning for Spoken Language Understanding.
Proceedings of the Interspeech 2020, 2020
Proceedings of the Advances in Digital Forensics XVI, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019
Identifying inter-individual differences in pain threshold using brain connectome: a test-retest reproducible study.
NeuroImage, 2019
A neural mechanism of direct and observational conditioning for placebo and nocebo responses.
NeuroImage, 2019
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019
Augmented Data Science: Towards Industrialization and Democratization of Data Science.
CoRR, 2019
Appl. Soft Comput., 2019
Int. J. Appl. Earth Obs. Geoinformation, 2019
An Internet of Things-enabled BIM platform for modular integrated construction: A case study in Hong Kong.
Adv. Eng. Informatics, 2019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019
IEEE Access, 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019
Two-Sample Tests for High Dimensional Distributions Using One-Dimensional Random Projections.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
CLUES: Detection of User Intent through Interactive Comparison.
Proceedings of the Advances in Data Mining, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting<sup>*</sup>.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019
Proceedings of the Guide to Mobile Data Analytics in Refugee Scenarios, 2019
2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018
A unified clustering approach for identifying functional zones in suburban and urban areas.
Proceedings of the IEEE INFOCOM 2018, 2018
Proceedings of the 2nd International Conference on Compute and Data Analysis, 2018
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018
2017
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wirel. Pers. Commun., 2017
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017
Mob. Inf. Syst., 2017
Comput. Secur., 2017
Proceedings of the 2017 IEEE International Conference on Real-time Computing and Robotics, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
2015
Secur. Commun. Networks, 2015
A fast gene selection method for multi-cancer classification using multiple support vector data description.
J. Biomed. Informatics, 2015
A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Smart Comput. Rev., 2014
Int. J. Grid Util. Comput., 2014
EURASIP J. Adv. Signal Process., 2014
IEEE Commun. Surv. Tutorials, 2014
Bell Labs Tech. J., 2014
Bell Labs Tech. J., 2014
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Integrated capacity allocation policies for a production service system with two-class customers and items.
Proceedings of the 2013 IEEE International Conference on Automation Science and Engineering, 2013
2012
IEEE Trans. Wirel. Commun., 2012
KSII Trans. Internet Inf. Syst., 2012
Frontiers Comput. Sci., 2012
Comput. Networks, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application.
Proceedings of the 2012 IEEE Asia-Pacific Services Computing Conference, 2012
2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
IEEE Trans. Signal Process., 2010
Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks.
Comput. Networks, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 18th annual IEEE International Conference on Network Protocols, 2010
2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2008
Traffic recovery time constrained shared sub-path protection algorithm in survivable WDM networks.
Comput. Networks, 2008
Bell Labs Tech. J., 2008
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008
Mobile User Profile Acquisition through Network Observables and Explicit User Queries.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008
A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
Proceedings of the Fourth International Conference on Networking and Services, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks.
J. Netw. Comput. Appl., 2007
J. Netw. Comput. Appl., 2007
Optical Communications New and enhanced protection scheme in survivable meshed WDM optical networks.
Eur. Trans. Telecommun., 2007
Highly efficient styrylamine-doped blue and white organic electroluminescent devices.
Displays, 2007
Spectral studies of white organic light-emitting devices based on multi-emitting layers.
Displays, 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
2006
Microelectron. J., 2006
IEEE Commun. Lett., 2006
Nonlinear 3-D Motion Simulation Using Multi-Sensor Data Fusion.
Proceedings of the 2006 International Conference on Modeling, 2006
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006
Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006
2004
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004
Fault diagnosis in a class of nonlinear systems using identification and GLR testing.
Proceedings of the 2004 American Control Conference, 2004
Proceedings of the 2004 American Control Conference, 2004
2002
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002
Proceedings of the American Control Conference, 2002
2001
Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, 2001
Proceedings of the American Control Conference, 2001